tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search



Here          Top          Up          Prev          None
part:    1     2


8 Establishment of security between UE and ePDG    8.1 General    8.2 Mechanisms for the set up of UE-initiated IPsec tunnels    9 Security for IP based mobility signalling    9.1 General    9.2 Host based Mobility    9.3 Network based Mobility    10 Security interworking between 3GPP access networks and non-3GPP access networks    10.1 General    10.2 CDMA2000 Access Network    11 Network Domain Security    12 UE-ANDSF communication security    12.1 UE-ANDSF communication security requirements    12.2 UE-ANDSF communication security solution    13 Security aspects of emergency call handling    13.1 General    13.2 Requirements for emergency call handling    13.3 Unauthenticated emergency calls over untrusted WLAN    13.4 Unauthenticated emergency calls over trusted WLAN    14 Temporary identity management    14.1 Temporary identity generation    14.2 Key management    14.3 Impact on permanent user identities    14.4 Acknowledged limitations    14.5 UE behaviour on receiving requests to send the IMSI-based user identity    A [N] Key derivation functions    A.1 KDF interface and input parameter construction    A.2 Function for the derivation of CK', IK' from CK, IK    A.3 Function for the derivation of WLCP key from EMSK    A.4 Function for the derivation of MSK key for unauthenticated emergency sessions over WLAN    B [N] Tunnelling of UE Services over restrictive access networks    B.1 Overview    B.2 Service and media reachability for users over restrictive firewalls - untrusted non 3GPP access    C List of 3GPP-vendor specific EAP-methods    D Change history   


8   Establishment of security between UE and ePDG [R8]   PDF-p. 33      Up
9   Security for IP based mobility signalling [R8]   PDF-p. 41
10   Security interworking between 3GPP access networks and non-3GPP access networks [R8]   PDF-p. 51
11   Network Domain Security [R8]   PDF-p. 52
12   UE-ANDSF communication security [R8]
13   Security aspects of emergency call handling [R9]   PDF-p. 53
14   Temporary identity management [R13]   PDF-p. 60
A  (Normative)   Key derivation functions [R8]   PDF-p. 63      Up
B  (Normative)   Tunnelling of UE Services over restrictive access networks [R12]   PDF-p. 65
C   List of 3GPP-vendor specific EAP-methods [R14]   PDF-p. 67
D   Change history   PDF-p. 68

Up          Top